Latest XenServer and Citrix Hypervisor vulnerabilities #
Citrix released a security update to address vulnerabilities in their XenServer and Hypervisor virtualization products.
Citrix outlines that the following affects both XenServer 8 and Citrix Hypervisor 8.2 CU1 LTSR and could allow a malicious administrator of a guest VM to cause the host to crash or become unresponsive.
- CVE-2024-45817 has not been rated, but affects how the state of the system could end up in deadlock due to a recursive call guarded by a mutex on x86's APIC (Advanced Programmable Interrupt Controller) architecture when reporting errors to a status.
- CVE-2022-24805 is not rated, but affects net-snmp and allows for a classic buffer overflow.
- CVE-2022-24809 is not rated, but affects net-snmp and allows for a NULL pointer dereference.
Both of these can be triggered by a user with read-only credentials.
What is the impact? #
The vulnerabilities may all be triggered by guest or read-only credentials which increases the likelihood of them occurring.
Are updates or workarounds available? #
Citrix recommends limiting access to management interfaces as well as upgrading to one of the following versions:
How do I find potentially vulnerable systems with runZero? #
From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:
(product:citrix and type:hypervisor) or product:xenserver